发明名称 Collaborative phishing attack detection
摘要 Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals who have received that message. The individuals may flag the message as a possible phishing attack, and/or may provide a numerical ranking indicating the likelihood that the message is a possible phishing attack. As responses from different individuals may have a different degree of reliability, each response from an individual may be weighted with a corresponding trustworthiness level of that individual, in an overall determination as to whether a message is a phishing attack. A trustworthiness level of an individual may indicate a degree to which the response of that individual can be trusted and/or relied upon, and may be determined by how well that individual recognized simulated phishing attacks.
申请公布号 US9591017(B1) 申请公布日期 2017.03.07
申请号 US201615138188 申请日期 2016.04.25
申请人 PhishMe, Inc. 发明人 Higbee Aaron;Belani Rohyt;Greaux Scott
分类号 H04L29/06 主分类号 H04L29/06
代理机构 CipherLaw 代理人 CipherLaw
主权项 1. A method for identifying and processing email messages received at a remote computing device in connection with a simulated phishing email campaign, comprising: generating, by a network device, a simulated phishing email, wherein the simulated phishing email is a non-malicious email that resembles a real phishing attack by attempting to lure an individual into performing a target action on the remote computing device, wherein the simulated phishing email comprises at least one embedded hyperlink, and wherein if the individual performs the target action, performance of the target action does not compromise the remote computing device or personal information of the individual; causing the simulated phishing email to be transmitted over a communications network to the remote computing device, the simulated phishing email comprising an identifying header, wherein the identifying header identifies the simulated phishing email as a non-malicious simulated phishing email sent by the network device; providing a plug-in for an email client at the remote computing device, the plug-in configurable for executing computer instructions for: receiving a graphical user interface action performed by the individual indicating that an email, the email being either the simulated phishing email or another email, delivered in an email account associated with the individual has been identified by the individual as a possible phishing attack;determining whether the identified email is a known simulated phishing attack by comparing one or more headers of the identified email to stored information identifying at least one known simulated phishing attack;when the identified email is determined to be a known simulated phishing attack based on the comparison of the one or more headers of the identified email to stored information identifying at least one known simulated phishing attack, providing a graphically displayed feedback to the individual confirming that the identified email was a simulated phishing attack; andwhen the identified email is determined not to be a known simulated phishing attack based on the comparison of the one or more headers of the identified email to the stored information identifying at least one known simulated phishing attack, causing the plugin to send the identified email for analysis or detection of whether or not the identified email is a phishing attack;wherein the plugin is further configurable to provide a graphical user interface element that, when selected, causes a notification to be sent to the network device, the notification triggered by the user interface action by the individual that the email delivered in the email account associated with the individual has been identified by the individual as a possible phishing attack; receiving the notification over the communications network by the network device from the remote computing device; if the identified email is determined to be a known simulated phishing attack based on the comparison of the one or more headers of the identified email to stored information identifying at least one known simulated phishing attack, electronically recording data indicating that the email has been identified as a simulated phishing attack; if the identified email is determined not to be a known simulated phishing attack based on the comparison of the one or more headers of the identified email to stored information identifying at least one known simulated phishing attack, electronically recording data indicating that the email has been identified as a potential phishing attack; and causing the provisioning of an electronic training to the individual if the individual clicks on the embedded hyperlink in the simulated phishing email.
地址 Leesburg VA US